Security and Communication Networks

Table of Contents: 2022

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 5429195
  • - Review Article

Cryptographic Accumulator and Its Application: A Survey

Yongjun Ren | Xinyu Liu | ... | Weijian Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1401683
  • - Research Article

[Retracted] Detection of DDoS Attack within Industrial IoT Devices Based on Clustering and Graph Structure Features

Hengchang Jing | Jian Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1939796
  • - Research Article

[Retracted] AI-Based Secure Construction of University Information Services Platform

Zongjun Wang | Xingdong Du | Lei Wu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4140774
  • - Research Article

[Retracted] Knowledge-Based Intelligent Education Recommendation System with IoT Networks

Xin Xin | Tianlei Shi | Mishal Sohail
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 2050181
  • - Research Article

[Retracted] Analysis Model of Personality and Psychological Characteristics of Network Users under High-Pressure Working Environment

Bin Yang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3844626
  • - Research Article

[Retracted] Digital Protection Technology of Cultural Heritage Based on ArcGIS Geographic Information Technology Algorithm

Xiaoying Guo | Weigang Jiang | ... | Kai Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 7517347
  • - Research Article

[Retracted] A Graph Neural Network (GNN) Algorithm for Constructing the Evolution Process of Rural Settlement Morphology

Zhe Hu | Kexin Chen | Xiaofei Xie
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1870779
  • - Research Article

A Lightweight Data Integrity Verification with Data Dynamics for Mobile Edge Computing

Haiyan Wang | Yi Lin | Fu Xiao
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 4280617
  • - Research Article

A Privacy Preserving Authentication Protocol Using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks

Kumar Prateek | Fahiem Altaf | ... | Soumyadev Maity
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9779670
  • - Research Article

A Lightweight Authentication with Dynamic Batch-Based Group Key Management Using LSTM in VANET

Xieyang Shen | Chuanhe Huang | ... | Danxin Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 1182315
  • - Research Article

Aggregated Traffic Anomaly Detection Using Time Series Forecasting on Call Detail Records

Arian Mokhtari | Niloofar Ghorbani | Behnam Bahrak
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 7040441
  • - Research Article

[Retracted] Design of Pedagogy Course Information Sharing System Based on Wireless Sensor Network

Xianzhu Jin
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 7003265
  • - Research Article

A Network Sampling Strategy Inspired by Epidemic Spreading

Qiang Dong | En-Yu Yu | Wen-Jun Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4429898
  • - Research Article

[Retracted] IoT Networks Assisted Baduanjin Auxiliary Training System Based on Depth Camera

Pengfei Wan | Yongqiang Liu | Hongjie Gao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4443834
  • - Research Article

[Retracted] Computational Technologies for the Wearable Sports Training System Based on Sensor Acquisition

Guochang Wang | Qinghui Meng | Wen Xu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.